Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Tim Bandos
Vice President of Cybersecurityfeature_status*/ ?>
Digital Guardian

Comments Dotted : 9
October 06, 2020

Experts On UK’s HMRC ‘Bombarded’ By 5,000 Malicious Email Attacks Every Day

Relying on individuals to be security savvy enough to prevent these attacks is misguided.
We are definitely seeing a huge rise with phishing attacks in a COVID-19 theme being the primary aggressor. I wouldn't necessarily say the total number of cyberattacks has gone up. I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their business.....Read More
We are definitely seeing a huge rise with phishing attacks in a COVID-19 theme being the primary aggressor. I wouldn't necessarily say the total number of cyberattacks has gone up. I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their business practices because IT security tools are not infallible against human behaviour. Relying on individuals to be security savvy enough to prevent these attacks is misguided. Yes, everyone should be educated but organisations have to do as much as possible to reduce the chance of individuals having to face these risk prone interactions with technological means.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Relying on individuals to be security savvy enough to prevent these attacks is misguided. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-pn-uks-hmrc-bombarded-by-5000-malicious-email-attacks-every-day

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Relying on individuals to be security savvy enough to prevent these attacks is misguided. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-pn-uks-hmrc-bombarded-by-5000-malicious-email-attacks-every-day

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 01, 2020

Healthcare Giant UHS Hit By Ransomware Attack: Expert Commentary

Not to mention protecting sensitive data and PII information which inevitably becomes a primary target in soliciting payment.
Even during a pandemic, ransomware distributors continue to take advantage of the healthcare industry while medical professionals are continuously working hard to slow down the contagion and save lives. Cybercriminal gangs only care about one thing; to profit even at the greatest expense of all. Some ransomware developers have signaled to the industry that they would not target healthcare facilities to show some sign of empathy, however, these statements are clearly non-binding and will.....Read More
Even during a pandemic, ransomware distributors continue to take advantage of the healthcare industry while medical professionals are continuously working hard to slow down the contagion and save lives. Cybercriminal gangs only care about one thing; to profit even at the greatest expense of all. Some ransomware developers have signaled to the industry that they would not target healthcare facilities to show some sign of empathy, however, these statements are clearly non-binding and will continue. These actions should only further enforce the requirement for all businesses running computing technology that support health services to implement controls and technology that actually work to prevent the spread of ransomware or any other form of cyberattack that disrupts operations. The Ryuk Ransomware, which is believed to be associated with the UHS attack, is commonly delivered via email from phishing links or attachments. There are a myriad of controls that could stop this from email filtering, end-user security awareness, patching devices, endpoint protection platforms, to anti-virus. Hospitals need to fund cybersecurity programs more appropriately with a focus on gaining the right level of visibility across the environment and providing regular training to staff given the amount of responsibility they have on keeping patients safe. Not to mention protecting sensitive data and PII information which inevitably becomes a primary target in soliciting payment.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Not to mention protecting sensitive data and PII information which inevitably becomes a primary target in soliciting payment...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/healthcare-giant-uhs-hit-by-ransomware-attack-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Not to mention protecting sensitive data and PII information which inevitably becomes a primary target in soliciting payment...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/healthcare-giant-uhs-hit-by-ransomware-attack-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 07, 2020

Experts Insight On Ransomware attack on Argentina federal agency

We strongly encourage federal agencies to patch vulnerabilities as quickly as they can while ensuring all systems and programs are up to date.
Ransomware is incredibly dangerous as it not only encrypts sensitive data, rendering it inaccessible, but it can also disrupt critical applications and systems, causing major outages and stoppages in operations. We can expect cybercriminals to continue to exploit common vulnerabilities in these types of opportunistic ransomware campaigns - and we strongly encourage federal agencies to patch vulnerabilities as quickly as they can while ensuring all systems and programs are up to date.
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"We strongly encourage federal agencies to patch vulnerabilities as quickly as they can while ensuring all systems and programs are up to date...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-ransomware-attack-on-argentina-federal-agency

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"We strongly encourage federal agencies to patch vulnerabilities as quickly as they can while ensuring all systems and programs are up to date...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-ransomware-attack-on-argentina-federal-agency

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 18, 2020

Security Experts On Carnival Hit With Ransomware Attack Exposing Data

Ransomware is incredibly dangerous as it not only encrypts sensitive data, rendering it inaccessible, but it can also disrupt critical applications.
Ransomware is incredibly dangerous as it not only encrypts sensitive data, rendering it inaccessible, but it can also disrupt critical applications and systems, causing major outages and stoppages in operations. We can expect cybercriminals to continue to exploit common vulnerabilities in these types of opportunistic ransomware campaigns - and we strongly encourage companies to patch vulnerabilities as quickly as they can while ensuring all systems and programs are up to date.
Like(1)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ransomware is incredibly dangerous as it not only encrypts sensitive data, rendering it inaccessible, but it can also disrupt critical applications...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-on-carnival-hit-with-ransomware-attack-expsoing-data

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ransomware is incredibly dangerous as it not only encrypts sensitive data, rendering it inaccessible, but it can also disrupt critical applications...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-on-carnival-hit-with-ransomware-attack-expsoing-data

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 17, 2020

Experts Insight On Major US Twitter Accounts Hacked in Bitcoin Scam

Regardless of how far or deep, Twitter’s first job is explaining exactly what transpired and why, and what will be done to repair what is now a damaged trust.
Insider driven attacks are the hardest nut to crack – whether they are malicious or unintentional because of the abuse of valid access. With Twitter acknowledging that inside role, the next question becomes – how was the act as invasive and possible at such scale? That seems to be a question whose answer lies in the insider tool used. What does that tool enable in terms of access and control, who has access to it, and what are the mechanisms for oversight? Whether one or 10 people, the.....Read More
Insider driven attacks are the hardest nut to crack – whether they are malicious or unintentional because of the abuse of valid access. With Twitter acknowledging that inside role, the next question becomes – how was the act as invasive and possible at such scale? That seems to be a question whose answer lies in the insider tool used. What does that tool enable in terms of access and control, who has access to it, and what are the mechanisms for oversight? Whether one or 10 people, the ability to post (and even pin based on reports and social media traffic) on behalf of a user without triggering action is unsettling at best. What about access to DMs? And what else were the attackers able to do once inside beyond those tweets. Regardless of how far or deep, Twitter’s first job is explaining exactly what transpired and why, and what will be done to repair what is now a damaged trust.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Regardless of how far or deep, Twitter’s first job is explaining exactly what transpired and why, and what will be done to repair what is now a damaged trust...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Regardless of how far or deep, Twitter’s first job is explaining exactly what transpired and why, and what will be done to repair what is now a damaged trust...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 07, 2020

Expert On Insta Star Used BEC Fraud Attack to Steal £100m from Football Club

Business Email Compromise continues to be a significant issue.
Business Email Compromise continues to be a significant issue. Companies will traditionally roll out security awareness training to their employees about not opening suspicious email attachments or clicking on links, but how many companies train their staff to refuse or question a direct command from senior staff? The art of “whaling” aims to compromise a senior staff member’s email and then use that to instruct junior staff to make payments to bank accounts of fraudsters. Because.....Read More
Business Email Compromise continues to be a significant issue. Companies will traditionally roll out security awareness training to their employees about not opening suspicious email attachments or clicking on links, but how many companies train their staff to refuse or question a direct command from senior staff? The art of “whaling” aims to compromise a senior staff member’s email and then use that to instruct junior staff to make payments to bank accounts of fraudsters. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their business practices because IT security tools are not infallible against human behaviour. As an example, train your staff to require third party validation for any financial transaction or introduce payment procedures requiring multiple sets of independent eyes. Malicious individuals are abusing the fact that junior staff implicitly trust their seniors and act quickly as instructed. You must put in place processes and beliefs that when unordinary requests come through they should be questioned.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Business Email Compromise continues to be a significant issue. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-insta-star-used-bec-fraud-attack-to-steal-100m-from-football-club

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Business Email Compromise continues to be a significant issue. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-insta-star-used-bec-fraud-attack-to-steal-100m-from-football-club

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 21, 2020

2,000 Coronavirus Scammers Taken Offline In NCSC Phishing Crackdown – Experts Reaction

I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity.
We are definitely seeing a huge rise with phishing attacks in a COVID-19 theme being the primary aggressor," he said. "I wouldn't necessarily say the total number of cyberattacks has gone up. I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their.....Read More
We are definitely seeing a huge rise with phishing attacks in a COVID-19 theme being the primary aggressor," he said. "I wouldn't necessarily say the total number of cyberattacks has gone up. I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their business practices because IT security tools are not infallible against human behaviour.  Read Less
Like(1)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"I do think the method by which they\'re carrying out these attacks is that they\'re leveraging this opportunity...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2000-coronavirus-scammers-taken-offline-in-ncsc-phishing-crackdown-experts-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"I do think the method by which they\'re carrying out these attacks is that they\'re leveraging this opportunity...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2000-coronavirus-scammers-taken-offline-in-ncsc-phishing-crackdown-experts-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 21, 2020

Experts Insight On Coronavirus Scammers Taken Offline In Major Phishing Crackdown

I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity.
We are definitely seeing a huge rise with phishing attacks in a COVID-19 theme being the primary aggressor," he said. "I wouldn't necessarily say the total number of cyberattacks has gone up. I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their.....Read More
We are definitely seeing a huge rise with phishing attacks in a COVID-19 theme being the primary aggressor," he said. "I wouldn't necessarily say the total number of cyberattacks has gone up. I do think the method by which they're carrying out these attacks is that they're leveraging this opportunity. Because these highly lucrative attacks are succeeding, they will continue to attract more groups willing to attempt their methods. It’s time that businesses consider applying security to their business practices because IT security tools are not infallible against human behaviour.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"I do think the method by which they\'re carrying out these attacks is that they\'re leveraging this opportunity...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-coronavirus-scammers-taken-offline-in-major-phishing-crackdown

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"I do think the method by which they\'re carrying out these attacks is that they\'re leveraging this opportunity...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-coronavirus-scammers-taken-offline-in-major-phishing-crackdown

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 10, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

I believe we'll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure.
I think geopolitical relationships around the world have increasingly become strained and uncertain with direction and I believe we'll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure. There have been a number of attempts and even successful attacks against these types of systems but for the most part they've all been isolated incidents. One can only wonder though if these attacks were merely conducted to set up backdoor functionality for a.....Read More
I think geopolitical relationships around the world have increasingly become strained and uncertain with direction and I believe we'll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure. There have been a number of attempts and even successful attacks against these types of systems but for the most part they've all been isolated incidents. One can only wonder though if these attacks were merely conducted to set up backdoor functionality for a future panic button push to cripple the target's systems. Not to mention the considerable adoption of IoT devices connecting once-segregated Operations Technology (OT) environments; which only further widens the attack landscape. The security in these environments need to be fully assessed and controls need to be put in place as soon as possible in order to mitigate against future attacks. It's only a matter of time.  Read Less
Like(0)  (0)

Linkedin Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"I believe we\'ll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tim Bandos, Vice President of Cybersecurity, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"I believe we\'ll see state-sponsored attacks being carried out much more; possibly even against critical infrastructure...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel